Re: [6tsch] minutes webex 5 July 2013
Thomas Watteyne <watteyne@eecs.berkeley.edu> Mon, 08 July 2013 02:11 UTC
Return-Path: <twatteyne@gmail.com>
X-Original-To: 6tsch@ietfa.amsl.com
Delivered-To: 6tsch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix)
with ESMTP id 62D5B21F9F40 for <6tsch@ietfa.amsl.com>;
Sun, 7 Jul 2013 19:11:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.834
X-Spam-Level:
X-Spam-Status: No, score=-1.834 tagged_above=-999 required=5 tests=[AWL=0.143,
BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uwTam8hyvSdq for
<6tsch@ietfa.amsl.com>; Sun, 7 Jul 2013 19:10:57 -0700 (PDT)
Received: from mail-pa0-x229.google.com (mail-pa0-x229.google.com
[IPv6:2607:f8b0:400e:c03::229]) by ietfa.amsl.com (Postfix) with ESMTP id
9DA9021F9F3E for <6tsch@ietf.org>; Sun, 7 Jul 2013 19:10:57 -0700 (PDT)
Received: by mail-pa0-f41.google.com with SMTP id bj3so3866370pad.0 for
<6tsch@ietf.org>; Sun, 07 Jul 2013 19:10:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
h=mime-version:sender:in-reply-to:references:from:date
:x-google-sender-auth:message-id:subject:to:content-type;
bh=48WZ8gcQSfAh8Q+uOWuQG1xT6X39+IKEKIFqB9odx0w=;
b=nDMbdK4eW9cD0U2F1fRq+Y2JICOeX6Stjr7og+pDP89UQFSg89ArZ9Q4OO3BsLPoe7
nxjdCb3SgEUssGbRB37hfJokBavwctqsYPKxOsud447+jx0g4wOf12FUFXFR/0XX6cKh
1N77evNByyiTOwAP4cHGxozpAv0QM8L2Mu3AbMDC5GyCegszUu0P1NEW6bAaKOI9uJ/R
NKP7p8w/kI41MwOvaTcyi9WUOqae/XAN1aEwr2l4QklLnOsBVJB2l3Mw3QGBk74DeNP7
krhG4+i0jHqv1FI5xwA82kMI2Lwy9b8IjXmAJ7B7lA1PZkqWR7Fvbd13wEosbeY6+eaq VcFg==
X-Received: by 10.68.97.229 with SMTP id ed5mr19224011pbb.37.1373249457159;
Sun, 07 Jul 2013 19:10:57 -0700 (PDT)
MIME-Version: 1.0
Sender: twatteyne@gmail.com
Received: by 10.66.147.228 with HTTP; Sun, 7 Jul 2013 19:10:36 -0700 (PDT)
In-Reply-To: <CADJ9OA-gPTxMnX1SGsJj_xBsHVVKcqLTD7JUCBSxBqqt3UQ5NA@mail.gmail.com>
References: <CADJ9OA-gPTxMnX1SGsJj_xBsHVVKcqLTD7JUCBSxBqqt3UQ5NA@mail.gmail.com>
From: Thomas Watteyne <watteyne@eecs.berkeley.edu>
Date: Sun, 7 Jul 2013 19:10:36 -0700
X-Google-Sender-Auth: -jbJ0MO9Pn-PRqLm2ue_BMZqr1U
Message-ID: <CADJ9OA8Xa82jtPS+D5xiaOcodb3iRgBe_yQWXH2kA7dV8KmE7Q@mail.gmail.com>
To: 6TSCH <6tsch@ietf.org>
Content-Type: multipart/alternative; boundary=047d7b67078915068004e0f68e95
Subject: Re: [6tsch] minutes webex 5 July 2013
X-BeenThere: 6tsch@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode
of IEEE 802.15.4e,
and impacts on RPL and 6LoWPAN such as resource allocation" <6tsch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tsch>,
<mailto:6tsch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tsch>
List-Post: <mailto:6tsch@ietf.org>
List-Help: <mailto:6tsch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tsch>,
<mailto:6tsch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Jul 2013 02:11:00 -0000
All, Please find below an updated version of the minutes of last meeting. Changes are highlighted in blue. Thanks Rene for spotting this! This new version replaces the previous one, and is also the one archived at https://bitbucket.org/6tsch/meetings/wiki/130705_webex. Thomas --- Minutes Webex 05 July 2013, 6TSCH group Note: timestamps in PDT. Taking notes *(using Etherpad)* 1. Xavi Vilajosana 2. Thomas Watteyne Present *(alphabetically)* 1. Alfredo Grieco 2. Guillaume Gaillard 3. Pascal Thubert 4. Pouria Zand 5. Rafa Marin-Lopez 6. Raghuram Sudhaakar 7. Rene Struik 8. Subir Da 9. Thomas Watteyne 10. Tina Tsou 11. Xavi Vilajosana 12. Yoshihiro Ohba Recording - Webex recording (audio+slides,streaming) - https://cisco.webex.com/ciscosales/lsr.php?AT=pb&SP=MC&rID=69696887&rKey=5ee52e950ccc11e9<https://cisco.webex.com/ciscosales/lsr.php?AT=pb&SP=MC&rID=69696887&rKey=5ee52e950ccc11e9> *[57min]* Slides - slides_130705_webex.ppt<https://bitbucket.org/6tsch/meetings/src/ceaae60071b8d2b0890c629a9fdae867c1f37391/130705_webex/slides_130705_webex.ppt?at=master>er>: slides shared during the call Agenda - Approval minutes last call *[1min]* - Update presentation esIoT *[1min]* - draft-ohba-6tsch-security-00 *[10min]* - Simulator *[10min]* - Description of PCE *[10min]* - Preparing for the BOF *[25min]* - Re-organization Bitbucket *[2min]* - AOB *[1min]* Minutes - *[08.05]* Meeting starts - *Thomas* goes over the agenda. - Very full agenda today. - *[08.08]* Approval minutes last call - *Thomas* asks for approval last week's minutes no major comments. Agenda approved. - *[08.08]* Update presentation esIoT - Maria Rita where she presented a paper on 6TSCH at http://www.esiot.com/ in Taiwan on 07/04/2013. - Thomas attended through Skype. - *Maria Rita* gave an excellent overview of what 6STCH is doing. - Her slides are very good, can be used as a basis for further presentations. - *[08.10]* draft-ohba-6tsch-security-00 - *Yoshihiro* presents http://tools.ietf.org/html/draft-ohba-6tsch-security-00. This is the official presentation of the draft. - draft submitted 06/24/2013. - Background: - ZigBee IP CSMA/CA MAC, has a common network key shared by all nodes in the mesh. - TSCH uses a 5-byte ASN counter as part of the CCM* nonce. - This draft provides a solution for key management in 6TSCH networks - Key Management Framework. 3 Phase currently described in the draft, suggestion to add Phase 0: - P0: Commisioning. What to put in a node before deployment? - P1: Boostrap. Starts when device is at its final location. (Re)installs credentials used for P2 and P3. Possibly no link layer security with the neighbor node. Authentication server used by each mote. Can be multiple hops away. installs credentials for P2 or P3. - P2: Link establishment. Neighbor nodes do two-party authentication and key establishement. No need to contact autentication server. - P3: After we study the application layer requirements, we can add more information. - Presents example sequence on slide - dashed arrows show phase 1. Node 0 is Auth Server. - solid arrows show P2 and P3. - P1 and P2 KMP requirements. depending on feedback and discussion, we can revise - P1 requirements: - suport mutual authentication - suport stateless authentication - secure credential distribution - P2 requirements: - 8 requirements. - Yoshihiro presents slide on P2 example phase with certificates - each node exchanges its CCM* key - candidate KMPs: - for P1: PANA, because of several issues presented later - for P2: several options - assymetric key credentials are used. - PANA overview - Protocol for Carrying Authentication for Network Access (PANA) - http://tools.ietf.org/html/rfc5191 - Extensible Authentication Protocol(EAP) over UDP - two extensions: - in ZIP, relay element in defined - http://tools.ietf.org/html/rfc6345 - http://tools.ietf.org/html/rfc6786 - PANA stateless relay operation. - joining node is PaC (PANA Client) - parent node is PRE (PANA Relay Element) - PANA relay message contains joining node's IP and port, allow stateless relaying of PANA message - recent discussion on ML: - EB protection - Need to be protected to not have attacks by forging EBs. - several candidate solutions. - multiple profiles: - There was a comment that solution might be too heavyweight for very constrained devices. Do we need profiles? - Profile A: what we have now in the draft - Profile B: common CCM* key. In this case, no device can be compromised. If a node is compromised, all of the keys need to be updated. Only applicable for small sized networks. - discussion - *[Pascal]* how are profiles used in ISA100? - *[Rene]* Not sure if remember (must check). Think asymetric and symetric keying in two separate profiles. - *[Pascal]* We want to have a superset of ISA100 does. - *[Rene]* It is important to think about the long-term requirements. We can imagine a case where only one profile is used. Not sure if realistic with the 8kB RAM requirements. - *[Subir]* Suggesting removethe 8kB requirements? - *[Rene]* We have to anticipate use cases on very large network. RAM requirements not that high for crypto. We need to look at the system cost as a whole. Flexibility of deployment might decrease if you require multiple device profiles, where less expensive devices may result in higher deployment cost (e.g., due to human involvement) and, thereby, higher system cost. Not a purely technical discussion. - *[08.35]* Simulator - *Xavi* shares his screen and presents simulator. - Open-source, hosted at https://bitbucket.org/6tsch/simulator - Added possibility for motes to re-allocate cells when collisions are detected. - Shows case with a 50 fully-meshed node network (i.e. neighborhood) with a random number of cells scheduled between motes. Detection is done by selecting bad cell in a bundle, and choose another cell randomly. - Network converges rather slowly now, but can be tuned by threshold to detect collision. - Measurements we can now make: how long before the schedule is collision-free? How many time we change one cell? - The simulator allows you to see the number of collisions for a cell. - Implemented different topologies, to study more realistic networks. - next step: want do we want to measure with this simulator? - discussion - *[Pascal]* we should start multiple thread on the ML. In particular one to discuss the algorithm for a node to detect that there are collision in a cell. - *[Pascal]* Interesting use case: if there are two independent 6TSCH networks in the same radio space, de-synchronized by 5ms, their cells will overlap, causing lots of schedule changes. - *[Xavi]* You're very welcome to play with the simulator and implement more features. Ticketting system ( https://bitbucket.org/6tsch/simulator/issues) used to track features to be implemented - *[Pascal]* It would be nice to have a HOWTO - *[Xavi]* Code is commented. Will work on a README. - *[08.45]* Description of PCE This point will not be addressed during this call. - *[08.45]* Preparing for the BOF - *Thomas* presents 4 slides on http://tools.ietf.org/html/rfc5434 - Goals of the BOF. - demonstrate that we have an agreement on the five points: - there is a problem that needs solving - IETF is the right place to solve it - we have a critical mass of people who can work on it - scope is well defined and understood - WG has a reasonable probability of having success *Preparing: - identify areas of agreement and disagreement - come up with consensus charter *Problem statement: - we need to go back to the charter. We have to be able to explain the problem. - the only goal is to show there is a problem and how we can solved - At the BOF - Agenda of the BOF has to focus on defending the need of the WG. - Present the problem to the public. - Audience needs to be convinced. We should not ask too many questions. - Avoid discussions about solution. - Avoid having too long presentation about solutions. - Proposed agenda (we have 1h30) - problem statement [30min] - what IEEE802.15.4e TSCH? - what is missing - quick overview of the status of the group - charter [30min] - we can follow the structure of the charter - *[Pascal]* we need to convince people that there is something that needs to be done. Convince that it can be done. show that this is a problem we can solve in a limited time. - drafts - idea is to show the activity of the group, not to discuss technical options. - TODO list before the BOF: - Ask on the ML who will be in Berlin. - Agree on ML who is going to talk about what during the BOF. - We will be looking for volunteers. - It would be good if Maria Rita, Xavi, Qin, could present. - Rehearsal at the call next week. - have a pre-meeting in Berlin, probably Monday afternoon or Tuesday morning. - quick doodle poll for meeting before meeting - Rename 6tus. - To 6top? We can have a quick call on the ML 6top seems to be good. - We need to do this ASAP. - JP Vasseur accepted to help on PCE. - *[09.02]* Re-organization Bitbucket - merge Orlando repo inside the meetings repo so meetings will end up being webex + ietf meetings. - prepare skeleton for berlin meeting. - Discussion: - *[Thomas]* Updated "About 6tsch" section of https://www.ietf.org/mailman/listinfo/6tsch to contain link to bitbucket? - *[Pascal]* A month from now we will have a working group page so maybe it is not needed. - *[09.05]* AOB No additional issues raised. - *[09.06]* Meeting ends On Fri, Jul 5, 2013 at 11:13 AM, Thomas Watteyne <watteyne@eecs.berkeley.edu > wrote: > All, > > You will find the minutes of the last webex below. > > FYI, all the minutes and slides are archived a > https://bitbucket.org/6tsch/meetings/. > > Thanks to Xavi for taking notes! > > As usual, fix anything we might have missed directly in the e-mail and > reply. > > Thomas > > --- > > Minutes Webex 05 July 2013, 6TSCH group > > Note: timestamps in PDT. > Taking notes *(using Etherpad)* > > 1. Xavi Vilajosana > 2. Thomas Watteyne > > Present *(alphabetically)* > > 1. Alfredo Grieco > 2. Guillaume Gaillard > 3. Pascal Thubert > 4. Pouria Zand > 5. Rafa Marin-Lopez > 6. Raghuram Sudhaakar > 7. Rene Struik > 8. Subir Da > 9. Thomas Watteyne > 10. Tina Tsou > 11. Xavi Vilajosana > 12. Yoshihiro Ohba > > Recording > > - Webex recording (audio+slides,streaming) > - > https://cisco.webex.com/ciscosales/lsr.php?AT=pb&SP=MC&rID=69696887&rKey=5ee52e950ccc11e9<https://cisco.webex.com/ciscosales/lsr.php?AT=pb&SP=MC&rID=69696887&rKey=5ee52e950ccc11e9> > *[57min]* > > Slides > > - slides_130705_webex.ppt<https://bitbucket.org/6tsch/meetings/src/ceaae60071b8d2b0890c629a9fdae867c1f37391/130705_webex/slides_130705_webex.ppt?at=master>er>: > slides shared during the call > > Agenda > > - Approval minutes last call *[1min]* > - Update presentation esIoT *[1min]* > - draft-ohba-6tsch-security-00 *[10min]* > - Simulator *[10min]* > - Description of PCE *[10min]* > - Preparing for the BOF *[25min]* > - Re-organization Bitbucket *[2min]* > - AOB *[1min]* > > Minutes > > - *[08.05]* Meeting starts > - *Thomas* goes over the agenda. > - Very full agenda today. > - *[08.08]* Approval minutes last call > - *Thomas* asks for approval last week's minutes > > no major comments. Agenda approved. > > - *[08.08]* Update presentation esIoT > - Maria Rita where she presented a paper on 6TSCH at > http://www.esiot.com/ in Taiwan on 07/04/2013. > - Thomas attended through Skype. > - *Maria Rita* gave an excellent overview of what 6STCH is doing. > - Her slides are very good, can be used as a basis for further > presentations. > - *[08.10]* draft-ohba-6tsch-security-00 > - *Yoshihiro* presents > http://tools.ietf.org/html/draft-ohba-6tsch-security-00. > > This is the official presentation of the draft. > > - draft submitted 06/24/2013. > - Background: > - ZigBee IP CSMA/CA MAC, has a common network key shared by all > nodes in the mesh. > - TSCH uses a 5-byte ASN counter as part of the CCM* nonce. > - This draft provides a solution for key management in 6TSCH > networks > - Key Management Framework. 3 Phase currently described in the > draft, suggestion to add Phase 0: > - P0: Commisioning. What to put in a node before deployment? > - P1: Boostrap. Starts when device is at its final location. > (Re)installs credentials used for P2 and P3. Possibly no link layer > security with the neighbor node. Authentication server used by each mote. > Can be multiple hops away. installs credentials for P2 or P3. > - P2: Link establishment. Neighbor nodes do two-party > authentication and key establishement. No need to contact autentication > server. > - P3: After we study the application layer requirements, we can > add more information. > - Presents example sequence on slide > - dashed arrows show phase 1. Node 0 is Auth Server. > - solid arrows show P2 and P3. > - P1 and P2 KMP requirements. depending on feedback and discussion, > we can revise > - P1 requirements: > - suport mutual authentication > - suport stateless authentication > - secure credential distribution > - P2 requirements: > - 8 requirements. > - Yoshihiro presents slide on P2 example phase with certificates > - each node exchanges its CCM* key > - candidate KMPs: > - for P1: PANA, because of several issues presented later > - for P2: several options > - assymetric key credentials are used. > - PANA overview > - Protocol for Carrying Authentication for Network Access (PANA) > - http://tools.ietf.org/html/rfc5191 > - Extensible Authentication Protocol(EAP) over UDP > - two extensions: > - in ZIP, relay element in defined > - http://tools.ietf.org/html/rfc6345 > - http://tools.ietf.org/html/rfc6786 > - PANA stateless relay operation. > - joining node is PaC (PANA Client) > - parent node is PRE (PANA Relay Element) > - PANA relay message contains joining node's IP and port, > allow stateless relaying of PANA message > - recent discussion on ML: > - EB protection > - Need to be protected to not have attacks by forging EBs. > - several candidate solutions. > - multiple profiles: > - There was a comment that solution might be too heavyweight > for very constrained devices. Do we need profiles? > - Profile A: what we have now in the draft > - Profile B: common CCM* key. In this case, no device can be > compromised. If a node is compromised, all of the keys need to be updated. > Only applicable for small sized networks. > - discussion > - *[Pascal]* how are profiles used in ISA100? > - *[Rene]* Not sure if remember (must check). Think asymetric > and symetric keying in two separate profiles. > - *[Pascal]* We want to have a superset of ISA100 does. > - *[Rene]* It is important to think about the long-term > requirements. We can imagine a case where only one profile is used. Not > sure if realistic with the 8kB RAM requirements. > - *[Subir]* Suggesting removethe 8kB requirements? > - *[Rene]* We have to anticipate use cases on very large > network. RAM requirements not that high for crypto. We need to lookg at the > system cost as a whole. Flexibility of deployment might decrease if you > require more expensive devices due to more strict requirements.. Not a > purely technical discussion. > - *[08.35]* Simulator > - *Xavi* shares his screen and presents simulator. > - Open-source, hosted at https://bitbucket.org/6tsch/simulator > - Added possibility for motes to re-allocate cells when collisions > are detected. > - Shows case with a 50 fully-meshed node network (i.e. > neighborhood) with a random number of cells scheduled between motes. > Detection is done by selecting bad cell in a bundle, and choose another > cell randomly. > - Network converges rather slowly now, but can be tuned by > threshold to detect collision. > - Measurements we can now make: how long before the schedule is > collision-free? How many time we change one cell? > - The simulator allows you to see the number of collisions for a > cell. > - Implemented different topologies, to study more realistic > networks. > - next step: want do we want to measure with this simulator? > - discussion > - *[Pascal]* we should start multiple thread on the ML. In > particular one to discuss the algorithm for a node to detect that there are > collision in a cell. > - *[Pascal]* Interesting use case: if there are two independent > 6TSCH networks in the same radio space, de-synchronized by 5ms, their cells > will overlap, causing lots of schedule changes. > - *[Xavi]* You're very welcome to play with the simulator and > implement more features. Ticketting system ( > https://bitbucket.org/6tsch/simulator/issues) used to track > features to be implemented > - *[Pascal]* It would be nice to have a HOWTO > - *[Xavi]* Code is commented. Will work on a README. > - *[08.45]* Description of PCE > > This point will not be addressed during this call. > > - *[08.45]* Preparing for the BOF > - *Thomas* presents 4 slides on http://tools.ietf.org/html/rfc5434 > - Goals of the BOF. > - demonstrate that we have an agreement on the five points: > - there is a problem that needs solving > - IETF is the right place to solve it > - we have a critical mass of people who can work on it > - scope is well defined and understood > - WG has a reasonable probability of having success > *Preparing: > - identify areas of agreement and disagreement > - come up with consensus charter *Problem statement: > - we need to go back to the charter. We have to be able to > explain the problem. > - the only goal is to show there is a problem and how we can > solved > - At the BOF > - Agenda of the BOF has to focus on defending the need of the > WG. > - Present the problem to the public. > - Audience needs to be convinced. We should not ask too many > questions. > - Avoid discussions about solution. > - Avoid having too long presentation about solutions. > - Proposed agenda (we have 1h30) > - problem statement [30min] > - what IEEE802.15.4e TSCH? > - what is missing > - quick overview of the status of the group > - charter [30min] > - we can follow the structure of the charter > - *[Pascal]* we need to convince people that there is > something that needs to be done. Convince that it can be done. show that > this is a problem we can solve in a limited time. > - drafts > - idea is to show the activity of the group, not to discuss > technical options. > - TODO list before the BOF: > - Ask on the ML who will be in Berlin. > - Agree on ML who is going to talk about what during the BOF. > - We will be looking for volunteers. > - It would be good if Maria Rita, Xavi, Qin, could present. > - Rehearsal at the call next week. > - have a pre-meeting in Berlin, probably Monday afternoon or > Tuesday morning. > - quick doodle poll for meeting before meeting > - Rename 6tus. > - To 6top? We can have a quick call on the ML 6top seems to > be good. > - We need to do this ASAP. > - JP Vasseur accepted to help on PCE. > - *[09.02]* Re-organization Bitbucket > - merge Orlando repo inside the meetings repo so meetings will end > up being webex + ietf meetings. > - prepare skeleton for berlin meeting. > - Discussion: > - *[Thomas]* Updated "About 6tsch" section of > https://www.ietf.org/mailman/listinfo/6tsch to contain link to > bitbucket? > - *[Pascal]* A month from now we will have a working group page > so maybe it is not needed. > - *[09.05]* AOB > > No additional issues raised. > > - *[09.06]* Meeting ends > >
- [6tsch] minutes webex 5 July 2013 Thomas Watteyne
- Re: [6tsch] minutes webex 5 July 2013 Thomas Watteyne
- Re: [6tsch] minutes webex 5 July 2013 Maria Rita PALATTELLA
- Re: [6tsch] minutes webex 5 July 2013 Thomas Watteyne